Title
Return-Oriented Programming Attack on the Xen Hypervisor
Abstract
In this paper, we present an approach to attack on the Xen hypervisor utilizing return-oriented programming (ROP). It modifies the data in the hypervisor that controls whether a VM is privileged or not and thus can escalate the privilege of an unprivileged domain (domU) at run time. As ROP technique makes use of existed code to implement attack, not modifying or injecting any code, it can bypass the integrity protections that base on code measurement. By constructing such kind of attack at the virtualization layer, it can motivate further research work towards preventing or detecting ROP attack on the hypervisor.
Year
DOI
Venue
2012
10.1109/ARES.2012.16
ARES
Keywords
Field
DocType
hypervisor,return-oriented programming,security,xen hypervisor,domu,virtualization layer,virtual machines,research work towardspreventing,rop technique,integrity protections,code measurement,return-oriented programming attack,unprivileged domain,integrity protection,rop attack,privilege escalation,vm,rop,data integrity,security of data
Virtual machine,Storage hypervisor,Privilege escalation,Computer security,Computer science,Hypervisor,Data integrity,Return-oriented programming,Operating system,Embedded system
Conference
ISBN
Citations 
PageRank 
978-1-4673-2244-7
4
0.42
References 
Authors
0
6
Name
Order
Citations
PageRank
Baozeng Ding1182.83
Yanjun Wu27323.02
Yeping He37714.64
Shuo Tian450.85
Bei Guan5172.77
Guowei Wu645545.43